Supercharge Your Innovation With Domain-Expert AI Agents!

A Method of Extracting Zero Watermark from Network Data Flow Using Information Entropy and Hash Function

A technology of hash function and zero watermark, applied in the field of confirming the relationship between communication parties in an anonymous network environment, which can solve the problems of high false positive rate and false negative rate, limited router storage resources, and easy loss of packet records.

Active Publication Date: 2019-03-12
HUAQIAO UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantages are: (1) Modify the IP protocol; (2) When the attack traffic is large enough, the backtracking performance is acceptable. For small traffic and single-packet attacks, the false positive rate and false negative rate are quite high
The key problem of this type of scheme is: due to the limited storage resources of routers, packet records are easily lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Extracting Zero Watermark from Network Data Flow Using Information Entropy and Hash Function
  • A Method of Extracting Zero Watermark from Network Data Flow Using Information Entropy and Hash Function
  • A Method of Extracting Zero Watermark from Network Data Flow Using Information Entropy and Hash Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see Figure 1 to Figure 5As shown, a method of using information entropy and hash function to extract the zero watermark of the network data flow in the present invention includes: in the original flow of the sending end, by fragmenting the data flow according to time, and counting the distribution of the data packet size and calculate the Shannon entropy, and use the hash function to extract the zero watermark; at the receiving end, use the same method to extract the zero watermark from the received traffic again; confirm the transmission by comparing the zero watermark extracted at both ends Whether there is an obvious network communication relationship between the terminal and the receiving terminal.

[0051] The steps of extracting the network stream zero watermark are:

[0052] A1. Obtain the original data stream t at the sending end, select an appropriate offset o, and slice the data stream according to a certain time slice size T to obtain l time slices;

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for zero watermark extraction of a network data stream by employing information entropy and a hash function. According to the algorithm, in original traffic of a transmitting terminal, the fragmentation of the data stream is performed according to time, statistics of the distribution condition of sizes of data packets is performed, Shannon entropy is calculated, and zero watermark extraction of the data stream is performed by employing the hash function; at a receiving terminal, zero watermark extraction of received traffic is performed again by employing the same method; and whether the transmitting terminal and the receiving terminal have an obvious network communication relation is confirmed via comparison of zero watermarks extracted at two terminals. By employing the extraction and detection method of a network stream zero watermark system, the network communication relation between the transmitting terminal and the receiving terminal in an anonymous communication system can be effectively determined, and theoretical basis is provided for DDoS attack localization.

Description

technical field [0001] The invention relates to the field of confirming the relationship between communication parties in an anonymous network environment, and more specifically, relates to a method for extracting a watermark from a network stream by using information entropy and a hash function, and a system for extracting and detecting the zero watermark of the network stream. Background technique [0002] With the rapid development of global informatization, computer network has become one of the most exciting high-tech in the world today. Network resource sharing, information exchange and distributed processing bring great convenience to study, work and scientific research. However, various attacks emerge in an endless stream, bringing huge potential threats and damage to computer networks and systems. [0003] Since 2000, network attacks have occurred continuously. According to the "2003 FBI Computer Crime and Security Survey", DDOS attacks are the second largest netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/1466H04L2463/146
Inventor 陈永红侯雪艳田晖王田蔡奕侨
Owner HUAQIAO UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More